Include the NAT table from PC2.

What will be an ideal response?


```
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
MASQUERADE all – 10.0.1.0/24 anywhere
```

Computer Science & Information Technology

You might also like to view...

Describe the logon and logoff procedures on a LINUX/UNIX system. What are the three ways to logout?

What will be an ideal response?

Computer Science & Information Technology

The Select tool samples the color attributes of an object.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Communication that does not require wires or cables for transmission of EM waves is called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

There has been great controversy over blasphemous speech in recent years and it is of great prominence because of the violence that sometimes results.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology